The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fault localization is a challenging task in domain specific data mining. Most existing works focus on call graph that can find bugs which are associated with control flow. However, there are a lot of bugs related to data flow. In this paper, we presented a data dependency graph in fault localization. The approach at first analyzes the execution of the test suites dynamically, then derives the data...
Affinity propagation clustering algorithm is with a broad value in science and engineering because of it no need to input the number of clusters in advances, robustness and good generalization. But the algorithm needs the initial similarity (the distance between any two points) as a parameter, a lot of time and storage space is required for the calculation of similarity. It's limited to apply to cluster...
This paper proposes a method of agricultural concept extraction with adaptivity, in order to elevate the quality of automatic or semi-automatic construction of agricultural ontology. This method constructs a model of Bayesian network combining context dependency analysis, domain dependencies and mutual information; then achieves conditional probability distribution table by means of data training...
We model software bug reports as a topological network called reporter network. By statistical analysis we And that the reporter network displays a number of features (scale-free, small-world, and etc.) shared by other complex networks. In order to understand the origins of these features, an evolving complex network model is proposed for the first time. The experimental results show that the model...
In this study, a novel clustering-based selection strategy of nondominated individuals for evolutionary multi-objective optimization is proposed. The new strategy partitions the nondominated individuals in current Pareto front adaptively into desired clusters. Then one representative individual will be selected in each cluster for pruning nondominated individuals. In order to evaluate the validity...
Robustness testing is a widely accepted approach to detect potential robustness weaknesses. However, the existing robustness testing approach suffers from some limitations, especially lacking support for automatic extraction of the SUT(System Under Test) specification knowledge, such as input syntax and interaction scenario. Such information is crucial for robustness test generation. In this paper,...
This research investigated the distribution of eutrophication degree in Nansi Lake using remote sensing data. Nine sampling points were monitored with Chla, TP and TN three parameters in upper lake of Nansi Lake. TSI of each sampling points was calculated using Carlsonpsilas TSIM. Then the linear model between remote sensing data and TSIM of each field monitoring points in upper lake of Nansi Lake...
A Schema-Guiding Evolutionary Algorithm (SGEA) is proposed in this paper. The novel SGEA has many good features. It proposes the schema-modified operator to adjust the distribution of the population. What's more, it constructs an elite-schema space and proposes the cluster-center schema to guide the direction of individual's evolution. And by such two strategies, the diversity of the population and...
Fuzzing is an effective approach to detect vulnerabilities. Unfortunately, the existing fuzzing approach suffers from some limitations, especially lacking support for automation in extracting the SUT specific knowledge and generating test script. In this paper, by combining fuzzing with TTCN-3 technique, we present T3FAH: a TTCN-3 based Fuzzer with Attack Heuristics. The approach automatically extracts...
To improve software productivity and quality, software engineers are increasingly applying data mining algorithms to various software engineering tasks. However, mining SE data poses several challenges. The authors present various algorithms to effectively mine sequences, graphs, and text from such data.
This research investigated the distribution of Chlorophyll-a and suspended substance (SS) in Nansi Lake using remote sensing data. The correlation between the Landsat5 TM data and the field measurement for water quality was analyzed using Pearson distribution theory. The remote sensing inversion model of Chlorophyll-a and SS in Nansi Lake as indexes of water quality were also established.
The problems of SH-wave scattering, which is caused by half-space circular cavity near the bimaterial interface and crack of arbitrary length and arbitrary position, are studied in this paper based on the field of elastodynamics, and the methods of Green's Function, complex variables function, the method of crack-division and multi-polar coordinates are used here. Firstly, a suitable Green's function...
Reusing Open Source Component (OSC) has become more and more popular in developing in-house applications. Before integrating an OSC into project, the component has to be evaluated according to the project. The lack of effective documentation, however, makes it hard to evaluate OSC. Behavior and performance are always the concentrated ones among the proposed criteria. But how to get access to the behavior...
With tremendous and ever-growing amounts of electronic documents from World Wide Web and digital libraries, it becomes more and more difficult to get information that people really want. In order to predigest search process, people use clustering method to browse through search results. However traditional Chinese information clustering techniques are inadequate since they don't generate clusters...
In order to solve the various issues in natural language processing more precisely, it is important to construct a system for automatic acquisition of domain terms. A method for automatic acquisition of domain terms from raw materials that are not segmented is presented in this paper. The raw domain corpus is pre-processed firstly. Then by using the method of information entropy and log-likelihood...
The extraction of playing shots is helpful for video analysis. In this paper, we propose an algorithm: first, the shots are segmented by detecting the shot boundaries (both abrupt cuts and gradual transitions), and wipes are discarded directly; then from the rest shots, playing shots are extracted by shot classification. Experimental results confirm the efficiency of our proposed algorithm.
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault localization aims at automatically locating likely fault locations, and hence assists manual debugging. A number of fault localization algorithms have been developed in recent years, which prove effective when multiple failing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.